In which of the following types of attack does an attacker exploit the carrier-sense multiple access with collision avoidance (CSMA/CA) clear channel assessment (CCA) mechanism to make a channel appear busy?
A. Beacon flood
B. Denial of service
C. Access point theft
D. EAP failure
Answer: B. Denial of service
Computer Science & Information Technology
You might also like to view...
The Document Inspector identifies personal information or hidden data with a(n):
A) animated icon. B) red flag. C) exclamation point. D) check mark.
Computer Science & Information Technology
The good member function will return false if:
a. The eof member function would return true. b. The bad member function would return true. c. The failbit member function would return true. d. Any of the above.
Computer Science & Information Technology